Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for intercepting malicious website access

A malicious URL and purpose technology, applied in the Internet field, can solve problems such as difficulty in extracting URLs, inapplicability, etc., and achieve the effect of improving security performance, preventing malicious network access behavior, and avoiding malicious URL access behavior.

Active Publication Date: 2021-02-19
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The inventor found in the process of implementing the present invention that the scope of application of the above-mentioned method 1 is limited due to the need to obtain Root authority; A piece of fake red envelope information, which will display the webpage corresponding to the malicious URL inside WeChat after the information is clicked; in addition, the log generated by the operating system will change due to the version of the operating system and the model of the intelligent electronic device, which will make It is difficult to accurately extract the URLs that need to be accessed; the third method above is also not applicable to application scenarios that do not need to use browser applications to open corresponding webpages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for intercepting malicious website access
  • Method and device for intercepting malicious website access
  • Method and device for intercepting malicious website access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1. A method for intercepting malicious website access.

[0038] figure 1 It is a flow chart of the method for intercepting malicious website access in this embodiment. Such as figure 1 As shown, the method of this embodiment mainly includes: step S100, step S110 and step S120. The method described in this embodiment is usually executed in smart electronic devices. Preferably, the method described in this embodiment is usually executed in smart electronic mobile devices such as smart mobile phones and tablet computers (ie user mobile devices). .

[0039] next to figure 1 Each step is described in detail.

[0040] S100. Analyzing IP (Internet Protocol, Internet Protocol) data packets.

[0041] Specifically, the IP data packet in this embodiment includes the IP data packet at the virtual network card place. Further, the IP data packet in this embodiment includes the IP data packet at the virtual network card place based on VPN (Virtual Private Network, vir...

Embodiment 2

[0086] Embodiment 2, a method for intercepting malicious website access. The procedure of this method is as follows Figure 2-Figure 4 shown.

[0087] figure 2 In, S200, open the VPN service supported by the Andriod operating system in the intelligent electronic device, set the relevant parameters of the virtual network card, set the IP address of the virtual network card to be VirtualIP; set the proxy server in the intelligent electronic device, and set the proxy server The IP address and port are ProxyIp and ProxyPort respectively. to S210.

[0088] The proxy server in this embodiment is mainly used for listening to the socket connection request, and when listening to the socket connection request, agrees the socket connection or rejects the answer of the socket connection to the socket connection request; the proxy server is also used for agreeing the socket connection Afterwards, a TCP session (TCP session) is established for the socket connection, so that operations ...

Embodiment 3

[0116] Embodiment 3, the implementation device for intercepting malicious website access.

[0117] The structure of the implementation device for intercepting malicious website access in this embodiment is as follows: Figure 5-Figure 12 shown.

[0118] Figure 5 The device mainly includes: a resolution module 510, a domain name information comparison module 540, and an interception processing module 550. Optionally, the device may further include: any one or more of a reading module 500 , a first judging module 520 , a first transmission processing module 530 , a second transmission processing module 560 and a third judging module 570 .

[0119] The parsing module 510 is mainly used for parsing IP data packets. The parsing module 510 in this embodiment can be independent of Figure 12 The virtual network card packet processing module in the network can be set independently, of course, it can also be set in Figure 12 In the virtual network card packet processing module. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device for intercepting malicious website access, wherein the method includes: parsing IP data packets, the IP data packets include the IP data packets at the virtual network card; determining that the IP data packets contain If there is domain name information, compare the domain name information with the information in the collection of malicious URLs; if the result of the comparison is that the domain name information matches the information in the collection of malicious URLs, perform Intercept processing. According to the solution of the present invention, the harm caused by malicious network access behavior can be prevented comprehensively and effectively, the safety performance of the intelligent electronic device is improved, and it has the characteristics of good applicability, easy popularization and the like.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for intercepting access to a malicious website and a device for intercepting access to a malicious website. Background technique [0002] With the rapid development of Internet technology, especially mobile Internet technology, users can often use their smart electronic devices, especially smart mobile phones, to access the network anytime and anywhere. Since the access behavior of smart electronic devices (such as applications installed in smart electronic devices, etc.) to malicious websites often causes the leakage of users' personal information and even the loss of personal property, users pay more and more attention to network access security issues. [0003] Existing methods for preventing smart electronic devices from accessing malicious websites mainly include the following three methods: [0004] Method 1. Based on the Root technology, avoid the access of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0272
Inventor 王灏韩建兵
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products